Manipulative zero-stealthy attacks in cyber-physical systems: Existence space of feasible attack objectives

Takumi Shinohara, Toru Namerikawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

In this paper, we analyze the vulnerabilities due to novel integrity cyber attacks in CPS, which are modeled as a stochastic Linear Time-Invariant (LTI) system equipped with a Kalman filter, an LQG controller, and a χ2 failure detector from an attacker's standpoint. The attacks are designed by a sophisticated attacker so that the measurement residual of the compromised system coincides with the healthy one. Additionally, the attacked system state is manipulated to an objective which is designed by the adversary. We first show an existence condition and a design procedure of the stealthy attacks using invariant subspace property. Then, we formulate the stealthy attacks with a malicious objective, and the condition of the feasible objectives is derived. Finally, the dangerousness of the attacks is verified through a numerical simulation.

Original languageEnglish
Title of host publication1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1123-1128
Number of pages6
ISBN (Electronic)9781509021826
DOIs
Publication statusPublished - 2017 Oct 6
Event1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017 - Kohala Coast, United States
Duration: 2017 Aug 272017 Aug 30

Publication series

Name1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017
Volume2017-January

Other

Other1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017
Country/TerritoryUnited States
CityKohala Coast
Period17/8/2717/8/30

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Hardware and Architecture
  • Software
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Manipulative zero-stealthy attacks in cyber-physical systems: Existence space of feasible attack objectives'. Together they form a unique fingerprint.

Cite this